Brute force with hashcat - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Misc (https://hashcat.net/forum/forum-15.html) +--- Forum: General Talk (https://hashcat.net/forum/forum-33.html) +--- Thread: Brute force with hashcat (/thread-11965.html) |
Brute force with hashcat - carollinney - 05-10-2024 Starting to learn hashcat and I wanted to brute force a hashed MD5 password. I used the command hashcat -m 0 hash -a 3 ?a?a?a?a?a?a?a ‐‐increment Which should start at 7 characters and increment. I ran this on a cloud GPU system with four Nvidia 4090’s and it said it would take less than 5 minutes to crack. However it finished with “exhausted” and wasn’t able to crack them. I tried generating other simple password hashes to test but still no luck. Why wasn’t brute force able to crack them despite it finishing? Shouldn’t it have gone through every possible combination if it had finished? RE: Brute force with hashcat - buka - 05-10-2024 (05-10-2024, 12:19 PM)carollinney Wrote: hashcat -m 0 hash -a 3 ?a?a?a?a?a?a?a ‐‐increment No, it shouldn't. Someone has misinformed you. RE: Brute force with hashcat - 174region174 - 05-12-2024 (05-10-2024, 12:22 PM)buka Wrote:(05-10-2024, 12:19 PM)carollinney Wrote: hashcat -m 0 hash -a 3 ?a?a?a?a?a?a?a ‐‐increment hashcat -m 0 hash -a 3 -i --increment-min=7 ?a?a?a?a?a?a?a?a?a?a?a RE: Brute force with hashcat - carollinney - 05-13-2024 (05-10-2024, 12:22 PM)buka Wrote:Really, so sad(05-10-2024, 12:19 PM)carollinney Wrote: hashcat -m 0 hash -a 3 ?a?a?a?a?a?a?a ‐‐increment |